At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for an improved access system
A method and apparatus to enable a user to send an action message including secure credential is described. The system comprises a receiving logic to receive...
System and method for managing flash memory
A system and method for flash memory management is provided. In particular, the system and methods herein provide for management of flash memory, particularly...
Method for generating universal objects identifiers in distributed
multi-purpose storage systems
A computer implemented method and system for generating secure universal object identifiers on a multipurpose storage system is disclosed. According to one...
Approach for printing policy-enabled electronic documents using locked
printing and a shared memory data structure
According to approach for printing policy-enabled electronic documents, when a locked print module determines that an electronic document contained in the PDF...
Multi-channel rotary encoder
Method for operating a multi-channel rotary encoder comprising at least one printed circuit board on which one or a plurality of functional units (1, 1a, 1b,...
Secure smartphone-operated gun trigger lock
A gun trigger-locking device which is configured to be manually installed on a gun with a trigger-blocking member disposed behind the trigger to prevent the gun...
System and method for NFC peer-to-peer authentication and secure data
A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted...
Wireless programmable microphone apparatus and system for integrated
surveillance system devices
A wireless programmable microphone apparatus and related devices are disclosed. The programmable wireless microphone apparatus may be used by a law enforcement...
Networked personal video storage and delivery
A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal...
System and method for utilizing a secured service provider memory
A system and method for utilizing a secured service provider memory are disclosed. An electronic device is associated with a subscriber and is in communication...
Method and apparatus for the secure storage of audio signals
In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a...
Device for archiving handwritten information
There is provided an electronic pen device configured to be used with a remote secure server for registering handwritten signatures, the secure server...
Image processing apparatus that configures settings of information
security policy, method of controlling the...
An image processing apparatus which enables a user to change the user mode while maintaining the state compliant with the information security policy. A network...
Defending against browser attacks
In one example the opening of a primary browser to a URL may be detected, a reference browser may then be opened to the same URL, data input to respective data...
Method and system for prevention of malware infections
A system and method for prevention of malware infections, the system comprising: a secured server configured to authenticate a user and issue an identifier (ID)...
Systems and methods for classifying malicious network events
A system for classifying events on a computer network includes an event clustering engine for receiving event and log data related to identifiable actors from a...
Dual bypass module and methods thereof
A dual bypass module for managing an integrated secured network environment is provided. The module includes network ports that receive and transmit data...
File system level data protection during potential security breach
Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file...
Mitigating risk of account enumeration
Technology is disclosed for mitigating account enumeration and thus enhances network security. The technology can receive from a client computing device a...
Ensuring network connection security between a wrapped app and a remote
A network connection between an app on a mobile device and a remote server is either enabled or denied based on whether a security wrapped app can verify that...
System and method for associating a universal user identification and a
domain specific user identification
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system...
Transparent encryption/decryption gateway for cloud storage services
A mechanism is provided for secure data storage in a distributed computing system by a client of the distributed computing system. A gateway device intercepts a...
Systems and methods for secure file transfers
Embodiments of the disclosure can include systems and methods for secure file transfers. The onsite monitoring system secure file transfer solution can allow...
Securing software defined networks via flow deflection
A flow deflection capability is provided for deflecting data flows within a Software Defined Network (SDN) in order to provide security for the SDN. A flow...
IEEE 802.11U failover for a mesh network
The present invention provides IEEE 802.11u failover for a mesh network that contains a root node coupled to a network operations center through a backhaul...
Video cryptography system and method
A system and method implementing stenographic cryptography in a video data stream (VDS) is disclosed that embeds secret video data (SVD) in a graphical user...
Managed secure computations on encrypted data
The subject disclosure is directed towards secure computations of encrypted data over a network. In response to user desired security settings with respect to...
Systems and methods for secure handling of data
The methods and systems described herein provide for secure implementation of external storage providers in an enterprise setting. Specifically, the present...
Apparatus, system and method of establishing communication between an
application operating on an electronic...
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector...
Wedge shaped corner transmitter
A corner mounted device is provided. The corner mounted device includes a housing and a data transmitter within the housing. The housing may include a first...
Computing device connectors
Computing device connectors are described. In one or more implementations, a connector includes one or more communication contacts configured to support...
Real-time 3-D video-security
An image analysis technology that enables real-time fully 3-dimensionally integrated reconstruction of the live video-data derived from CCTV system's multiple...
System and method for distinguishing human swipe input sequence behavior
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure...
Ruggedized, compact and integrated one-way controlled interface to enforce
confidentiality of a secure enclave
A rugged, integrated network interface appliance for ensuring secure data transfer comprising send-only network interface circuitry comprising a microprocessor,...
Data security management systems and methods
Data security management system and methods are provided. First, a first system having a management authority is provided. The first system displays an input...
Method and apparatus for securing programming data of a programmable
Circuitry and methods prevent unauthorized programming, or reprogramming, of a programmable device, by requiring a signature in the configuration data to match...
Packet-processing scheduler, security context, authentication, packet
header, air cipher subsystem
An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least...
Method and apparatus for secure execution using a secure memory partition
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor...
Multi-ring encryption approach to securing a payload using hardware
Disclosed are systems and methods of employing a multi-ring encryption approach to secure a data payload. Each ring of encryption may be encrypted from a key...
Synchronizing parallel applications in an asymmetric multi-processing
A method for synchronizing parallel applications in a partitioned asymmetric multi-processing system having multiple independent levels of security is provided....
Secure memory access controller
A memory access circuit and a corresponding method are provided. The memory access circuit includes a crypto block in communication with a memory that encrypts...
System and method for collaborative programming of data entry workflows
between system developers, end users,...
The present invention is a system for collaborative programming of data entry workflows between end users, Electronic Health Record (EHR) system developers, and...
Power management for a wearable apparatus
Apparatus, systems, and/or methods may provide power management. An attachment portion may secure an apparatus to a user. In one example, an apparatus includes...
Systems and methods for packaging high density SSDS
In various embodiments, a high-density solid-state storage unit includes a base section and a cassette section having plurality of flash cards. The cassette...
Secure smartphone-operated gun lock with means for overriding release of
A gun locking and unlocking device, which may be configured to be disposed on or in a gun to alternatively prevent or enable firing, includes a data receiver, a...
Radio remote control system for controlling vehicle functions of a motor
A radio remote control for controlling at least one first vehicle function that is relevant for functional safety, and further vehicle functions not related to...
Method, apparatus, and system for data protection on interface in
A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are...
Multiple network, shared access security architecture supporting
simultaneous use of single SIM multi-radio...
A method and system is presented for a mobile wireless communication device that may communicate information to a first network device for enabling...
Behavioral authentication system using a secure element, a behaviometric
server and cryptographic servers to...
Embodiments of the disclosed technology are directed to methods and/or systems for using behavioral authentication for authenticating particular users of...
Security key generation for dual connectivity
Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a...